Use the following business rules to create a Crow’s Foot ERD. Write all appropriate connectivities and cardinalities in the ERD. a. A department employs many employees, but each employee is employed by one department. b. Some employees, known as “rovers,” are not assigned to any department. c. A division operates many departments, but each department is operated by one division. d. An employee may be assigned many projects, and a project may have many employees assigned to it. e. A project must have at least one employee assigned to it. f. One of the employees manages each department, and each department is managed by only one employee. g. One of the employees runs each division, and each division is run by only one employee. Given these data requirements, design a logical/relational data model for this company. Use Microsoft Visio for your diagrams. You can add substantial detail to your data model by including sample attributes for each of the entities. Specify primary and foreign keys for each relation. Create composite entities if necessary (for many-many relationships) Note: It is reasonable to assume that many of the relationships are optional and that some are mandatory. When in doubt, assume an optional relationship.

Question

Use the following business rules to create a Crow’s Foot ERD. Write all appropriate connectivities and cardinalities in the ERD. a. A department employs many employees, but each employee is employed by one department. b. Some employees, known as “rovers,” are not assigned to any department. c. A division operates many departments, but each department is operated by one division. d. An employee may be assigned many projects, and a project may have many employees assigned to it. e. A project must have at least one employee assigned to it. f. One of the employees manages each department, and each department is managed by only one employee. g. One of the employees runs each division, and each division is run by only one employee. Given these data requirements, design a logical/relational data model for this company. Use Microsoft Visio for your diagrams. You can add substantial detail to your data model by including sample attributes for each of the entities. Specify primary and foreign keys for each relation. Create composite entities if necessary (for many-many relationships) Note: It is reasonable to assume that many of the relationships are optional and that some are mandatory. When in doubt, assume an optional relationship.

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Other

Database Management

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: What is the difference between dynamic ARP table entries and static ARP table entries?

A: ARP: Address Resolution Protocol (ARP) is a significant protocol that holds the Transmission Contro...

Q: Which web application attack is more likely to extract privacy data elements out of a database?   Wh...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: What are some elements that are typically included in network diagrams?

A: Elements of network diagram: Network diagram is the representation of mapping of the network throu...

Q: Explain the following Excel functions, illustrate your answer using example.SUM COUNTIFIFSUMIF

A: The function SUM is used to add the numbers in a certain range given by the user as shown below: Syn...

Q: Which OSI layer is responsible for directing data from one LAN to another? a. Transport layer b. Net...

A: Network layer of Open System Interconnection (OSI) model is responsible for directing the data from ...

Q: A company that provides a movie-streaming subscription service uses a relational database to store i...

A: According to the given description the E-R diagram and its explanation are given below: - Explanatio...

Q: With PDM, show how someone impersonating Alice or Bob can do a dictionary attack if they choose a Di...

A: In the PDM protocol, there is a Diffie-Hellman exchange. The Diffie-Hellman numbers are then encrypt...

Q: Give three examples of routing metrics used by routers to determine the best of various available ro...

A:   The best path for a particular network cannot be determined until and unless the network is comple...

Q: 3. Write a function which reads an already existing file “File1.txt” and write digits (0-9) in to a ...

A: The program includes iostream, fstream,string and cctype header files. Declare the variables for inp...

Q: Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10...

A: SFP+ The SFP+ (Small Form-Factor Pluggable Plus) version is an improved SFP. It can accommodate the...

Q: The Jumpin’ Jive coffee shop charges $2 for a cup of coffee and offers the add-ins shown in the tabl...

A: Program approach: Create main function. Declare parallel array for nameOfProduct. Declare parallel ...

Q: How can I find the Pseudocodes and C++ codes for this problem?

A: Pseudocode: int A[]={1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,3...

Q: What is the fundamental distinction between a Layer 2 switch and a router?

A: Click to see the answer

Q: What kind of attack simulation detects vulnerabilities and attempts to exploit them? a. Red team-blu...

A: Penetration testing is an attack that finds the vulnerabilities and tries to clear them. Hence, corr...

Q: Draw a flowchart and write pseudocode for each of the following scenarios for the ABC College:a. The...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: Identify some of the challenges associated with building an information system infrastructure to sup...

A: Challenges faced by organizations while developing their own infrastructures: Major and the biggest...

Q: List and describe the three approaches to policy development

A: Approaches to policy development The first approach to policy development is Enterprise Information...

Q: Which protocol is supported by ICMPv6 to facilitate neighbor discovery on an IPv6 network?

A: Internet Protocol Version 6 (IPv6): It has an address length of 128 bits and the address is represe...

Q: Define Data selectors.

A: Data selector A multiplexer is also known as data selector and is a device that selects between sev...

Q: What software allows you to define VMs and manage resource allocation and sharing among them on a ho...

A: Hypervisor: There are two type of hypervisor, they are “Type 1” and “Type 2”. Type 1 hypervisor ins...

Q: write use cases in textual format for: 1. sending a message in whatsapp application . 2. purchase la...

A: ASSUMPTION: - Since the UseCases are required in textual format, so I will be explaining the terms i...

Q: Why is SMF more efficient over long distances than MMF?

A: SMF: SMF stands for Signal Mode Fiber. SMF is an optical fiber which is designed for the transmissi...

Q: Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?

A: Wi-Fi frequency band offering 24 unlicensed communication channels: Wireless LAN is a network that ...

Q: Show protocols for doing augmented forms of EKE and SPEKE.

A: Protocols for doing augmented forms of EKE and SPEKE: The augmented Exponential Key Exchange (EKE) ...

Q: Why might organizations be willing to take on the risk of BYOD?

A: Bring Your Own Device (BYOD): It is the practice of bringing the technical device of a particular i...

Q: Describe using example how excel table can be converted to a range of data

A: To convert and excel table to a range of data follow the steps below: Click on the table. Go to Des...

Q: You have just brought online a new secondary DNS server and notice your network-monitoring software ...

A: DNS is abbreviated as Domain Name System.   When a DNS server for a zone is not operating and cached...

Q: What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T...

A: "Cat 6a" is known as the earliest twisted-pair cabling standard that satisfies the minimum requireme...

Q: 9.18 A certain computer provides its users with a virtual-memory space of 232 bytes. The computer ha...

A: The size of the virtual-memory is 232 bytes or 4,294,967,296 bytes. The size of the physical memory ...

Q: What is use of Unix file system? How is it different from window file system? Explain its directorie...

A: Unix file system is basically used to store and organise huge volume of data and information making ...

Q: The time complexity equation of merger-sort is T(n) = 2* T(n/2) + n, where T(1) = C and C is a const...

A: I would show the answer of first question only. Please post second question separately. 

Q: What is the enigma machine? Explain the significance of this machine.

A: An Enigma machine is a popular encryption machine that was used by the Germans to send coded message...

Q: Given the pseudocode below. What will be shown as the final values of variable x, y and z if the fol...

A: For a) x = 3, y = 4, z = 5 Given pseudo-code:

Q: Which device converts signals from a campus’s analog phone equipment into IP data that can travel ov...

A: VoIP gateway is used for converting the signals from campus's analog phone equipment into Internet P...

Q: Which of these attacks is a form of Wi-Fi DoS attack? a. Rogue DHCP server b. FTP bounce c. Deauthen...

A: Click to see the answer

Q: Develop a simple data model for a student database that includes student contact data, student demog...

A: To create the data model for the given information the data model contains four tables: - Student_Co...